blob: 94b832d958c3e6f0516abcf20ef949032330540f (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
|
#!/bin/sh
[ "${acme:-}" = true ] || return 0
: ${acme_email:="root@${email_domain}"}
: ${acme_keylength:='ec-256'}
acme_cert_dir=/usr/local/etc/ssl/acme
acme_standalone_port=9080
acme_user=acme
acme_home=/var/db/acme
acme_webroot=/usr/local/www/acme
acmeproxy_home=/var/spool/acmeproxy
dhparams_path=/etc/ssl/dhparams.pem
pkg install -y acme.sh
install_directory -m 0775 -o root -g "$acme_user" "$acme_cert_dir"
install_template -m 0644 /etc/cron.d/acme
if [ -n "${acme_eab_kid:-}" ]; then
su -m "$acme_user" -c "acme.sh --home ${acme_home} --register-account --eab-kid ${acme_eab_kid} --eab-hmac-key ${acme_eab_hmac_key}"
else
su -m "$acme_user" -c "acme.sh --home ${acme_home} --register-account --email ${acme_email}"
fi
if [ "${nginx_public:-}" = true ] && ! [ -f "$dhparams_path" ]; then
openssl dhparam -out "$dhparams_path" 2048
fi
acme_install_certificate(){
_aic_group=0
_aic_cert_path=
_aic_key_path=
_aic_ca_path=
_aic_reload_cmd=
while getopts C:c:g:k:r: _aic_opt; do
case $_aic_opt in
C) _aic_ca_path=$OPTARG ;;
c) _aic_cert_path=$OPTARG ;;
g) _aic_group=$OPTARG ;;
k) _aic_key_path=$OPTARG ;;
r) _aic_reload_cmd=$OPTARG ;;
esac
done
shift $((OPTIND - 1))
_aic_name=$1
# Acquire the certificate via HTTP ACME challenge.
_aic_domain_args=''
for _aic_domain; do
_aic_domain_args="${_aic_domain_args} -d ${_aic_domain}"
done
if [ -n "${acme_standalone:-}" ]; then
su -m "$acme_user" -c "acme.sh --home ${acme_home} --issue --keylength ${acme_keylength} --standalone --httport ${acme_standalone_port} ${_aic_domain_args}" && _aic_rc=$? || _aic_rc=$?
else
install_directory -o root -g "$acme_user" -m 0775 "$acme_webroot"
su -m "$acme_user" -c "acme.sh --home ${acme_home} --issue --keylength ${acme_keylength} -w ${acme_webroot} ${_aic_domain_args}" && _aic_rc=$? || _aic_rc=$?
fi
case $_aic_rc in
0) ;; # New cert was issued.
2) ;; # Cert was unchanged.
*) die "failed to issue ACME certificate for: $*" ;;
esac
# Install the certificate to the requested location.
if [ -f "$_aic_key_path" ]; then
chmod 640 "$_aic_key_path"
chown "${acme_user}:${_aic_group}" "$_aic_key_path"
else
install -o "$acme_user" -g "$_aic_group" -m 0640 /dev/null "$_aic_key_path"
fi
if [ -n "$_aic_reload_cmd" ]; then
su -m "$acme_user" -c "acme.sh --home ${acme_home} --install-cert --domain ${_aic_name} --key-file ${_aic_key_path} --fullchain-file ${_aic_cert_path} --ca-file ${aic_ca_path} --reloadcmd '${_aic_reload_cmd}'"
else
su -m "$acme_user" -c "acme.sh --home ${acme_home} --install-cert --domain ${_aic_name} --key-file ${_aic_key_path} --fullchain-file ${_aic_cert_path} --ca-file ${aic_ca_path} "
fi
}
acme_setup_proxy(){
[ -n "${acmeproxy_domains:-}" ] || return 0
install_directory -o root -g wheel -m 0755 "$acmeproxy_home"
install_directory -o "$acme_user" -g "${acmeproxy_client_gid:-${acmeproxy_client_group}}" -m 0750 "${acmeproxy_home}/certs"
# Configure SSHD for acmeproxy.
install_template -m 0644 /usr/local/etc/ssh/sshd_config.d/acmeproxy.conf
service sshd reload
# Acquire ACME certificates for client SFTP.
for domain in $acmeproxy_domains; do
acme_install_certificate \
-c "${acmeproxy_home}/certs/${domain}.crt" \
-k "${acmeproxy_home}/certs/${domain}.key" \
-g "${acmeproxy_client_gid:-${acmeproxy_client_group}}" \
$domain
done
}
|